136 results on '"Djoudi, Mahieddine"'
Search Results
2. Learner to learner fuzzy profiles similarity using a hybrid interaction analysis grid
- Author
-
Khentout, Chabane, Harbouche, Khadidja, and Djoudi, Mahieddine
- Subjects
Computer Science - Artificial Intelligence ,Computer Science - Information Retrieval ,Computer Science - Multiagent Systems - Abstract
The analysis of remote discussions is not yet at the same level as the face-to-face ones. The present paper aspires twofold. On the one hand, it attempts to establish a suitable environment of interaction and collaboration among learners by using the speech acts via a semi structured synchronous communication tool. On the other, it aims to define behavioral profiles and interpersonal skills hybrid grid by matching the BALES' IPA and PLETY's analysis system. By applying the fuzzy logic, we formalize human reasoning and, thus, giving very appreciable flexibility to the reasoning that use it, which makes it possible to take into account imprecisions and uncertainties. In addition, the educational data mining techniques are used to optimize the mapping of behaviors to learner's profile, with similarity-based clustering, using Eros and PCA measures. In order to show the validity of our system, we performed an experiment on real-world data. The results show, among others: (1) the usefulness of fuzzy logic to properly translate the profile text descriptions into a mathematical format, (2) an irregularity in the behavior of the learners, (3) the correlation between the profiles, (4) the superiority of Eros method to the PCA factor in precision.
- Published
- 2021
- Full Text
- View/download PDF
3. An Enhanced Corpus for Arabic Newspapers Comments
- Author
-
Rahab, Hichem, Zitouni, Abdelhafid, and Djoudi, Mahieddine
- Subjects
Computer Science - Information Retrieval ,Computer Science - Computation and Language ,Computer Science - Multiagent Systems - Abstract
In this paper, we propose our enhanced approach to create a dedicated corpus for Algerian Arabic newspapers comments. The developed approach has to enhance an existing approach by the enrichment of the available corpus and the inclusion of the annotation step by following the Model Annotate Train Test Evaluate Revise (MATTER) approach. A corpus is created by collecting comments from web sites of three well know Algerian newspapers. Three classifiers, support vector machines, na{\"i}ve Bayes, and k-nearest neighbors, were used for classification of comments into positive and negative classes. To identify the influence of the stemming in the obtained results, the classification was tested with and without stemming. Obtained results show that stemming does not enhance considerably the classification due to the nature of Algerian comments tied to Algerian Arabic Dialect. The promising results constitute a motivation for us to improve our approach especially in dealing with non Arabic sentences, especially Dialectal and French ones., Comment: arXiv admin note: substantial text overlap with arXiv:2006.00459
- Published
- 2021
- Full Text
- View/download PDF
4. SANA : Sentiment Analysis on Newspapers comments in Algeria
- Author
-
Rahab, Hichem, Zitouni, Abdelhafid, and Djoudi, Mahieddine
- Subjects
Computer Science - Computation and Language ,Computer Science - Machine Learning - Abstract
It is very current in today life to seek for tracking the people opinion from their interaction with occurring events. A very common way to do that is comments in articles published in newspapers web sites dealing with contemporary events. Sentiment analysis or opinion mining is an emergent field who is the purpose is finding the behind phenomenon masked in opinionated texts. We are interested in our work by comments in Algerian newspaper websites. For this end, two corpora were used SANA and OCA. SANA corpus is created by collection of comments from three Algerian newspapers, and annotated by two Algerian Arabic native speakers, while OCA is a freely available corpus for sentiment analysis. For the classification we adopt Supports vector machines, naive Bayes and knearest neighbors. Obtained results are very promising and show the different effects of stemming in such domain, also knearest neighbors give important improvement comparing to other classifiers unlike similar works where SVM is the most dominant. From this study we observe the importance of dedicated resources and methods the newspaper comments sentiment analysis which we look forward in future works., Comment: 9 pages, 2 figures, 12 tables
- Published
- 2020
- Full Text
- View/download PDF
5. New Framework Model to Secure Cloud Data Storage
- Author
-
Beldjezzar, Leila, Zitouni, Abdelhafid, Djoudi, Mahieddine, Leila, Beldjezzar, Abdelhafid, Zitouni, and Mahieddine, Djoudi
- Subjects
Computer Science - Cryptography and Security - Abstract
Nowadays companies are increasingly adopting the technology ofcloud computing. This technology is subject to a lot of research and continuousadvances are made. The use of cloud computing in the companies advantagessuch as: reducing costs, sharing and exchange of information between institutions,but the data in the Cloud computing are susceptible to be compromisedand the companies are exposing to see their data loss. In this study, we addressthe subject of security in cloud computing; we expose and discuss someresearches that had been proposed to secure the data stored in the cloud. Andthen we will present our new frameworks that ensure confidentiality of datastorage in the cloud environment, Comment: arXiv admin note: substantial text overlap with arXiv:1902.00542
- Published
- 2020
- Full Text
- View/download PDF
6. A Cloud Security Framework Based on Trust Model and Mobile Agent
- Author
-
Benabied, Saddek, Zitouni, Abdelhafid, and Djoudi, Mahieddine
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Networking and Internet Architecture - Abstract
Cloud computing as a potential paradigm offers tremendous advantages to enterprises. With the cloud computing, the market's entrance time is reduced, computing capabilities is augmented and computing power is really limitless. Usually, to use the full power of cloud computing, cloud users has to rely on external cloud service provider for managing their data. Nevertheless, the management of data and services are probably not fully trustworthy. Hence, data owners are uncomfortable to place their sensitive data outside their own system .i.e., in the cloud. Bringing transparency, trustworthiness and security in the cloud model, in order to fulfill client's requirements are still ongoing. To achieve this goal, our paper introduces two levels security framework: Cloud Service Provider (CSP) and Cloud Service User (CSU). Each level is responsible for a particular task of the security. The CSU level includes a proxy agent and a trust agent, dealing with the first verification. Then a second verification is performed at the CSP level. The framework incorporates a trust model to monitor users' behaviors. The use of mobile agents will exploit their intrinsic features such as mobility, deliberate localization and secure communication channel provision. This model aims to protect user's sensitive information from other internal or external users and hackers. Moreover, it can detect policy breaches, where the users are notified in order to take necessary actions when malicious access or malicious activity would occur.
- Published
- 2020
- Full Text
- View/download PDF
7. ARAACOM: ARAbic Algerian Corpus for Opinion Mining
- Author
-
Abdelhafid, Zitouni, Rahab, Hichem, Zitouni, Abdelhafid, and Djoudi, Mahieddine
- Subjects
Computer Science - Computation and Language ,Computer Science - Information Retrieval - Abstract
Nowadays, it is no more needed to do an enormous effort to distribute a lot of forms to thousands of people and collect them, then convert this from into electronic format to track people opinion about some subjects. A lot of web sites can today reach a large spectrum with less effort. The majority of web sites suggest to their visitors to leave backups about their feeling of the site or events. So, this makes for us a lot of data which need powerful mean to exploit. Opinion mining in the web becomes more and more an attracting task, due the increasing need for individuals and societies to track the mood of people against several subjects of daily life (sports, politics, television,...). A lot of works in opinion mining was developed in western languages especially English, such works in Arabic language still very scarce. In this paper, we propose our approach, for opinion mining in Arabic Algerian news paper. CCS CONCEPTS $\bullet$Information systems~Sentiment analysis $\bullet$ Computing methodologies~Natural language processing
- Published
- 2020
- Full Text
- View/download PDF
8. Self Organization Agent Oriented Dynamic Resource Allocation on Open Federated Clouds Environment
- Author
-
Sofiane, Kemchi, Zitouni, Abdelhafid, and Djoudi, Mahieddine
- Subjects
Computer Science - Distributed, Parallel, and Cluster Computing - Abstract
To ensure uninterrupted services to the cloud clients from federated cloud providers, it is important to guarantee an efficient allocation of the cloud resources to users to improve the rate of client satisfaction and the quality of the service provisions. It is better to get as more computing and storage resources as possible. In cloud domain several Multi Agent Resource Allocation methods have been proposed to implement the problem of dynamic resource allocation. However the problem is still open and many works to do in this field. In cloud computing robustness is important so in this paper we focus on auto-adaptive method to deal with changes of open federated cloud computing environment. Our approach is hybrid, we first adopt an existing organizations optimization approach for self organization in broker agent organization to combine it with already existing Multi Agent Resource Allocation approach on Federated Clouds. We consider an open clouds federation environment which is dynamic and in constant evolution, new cloud operators can join the federation or leave this one. At the same time our approach is multi criterion which can take in account various parameters (i.e. computing load balance of mediator agent, geographical distance (network delay) between costumer and provider...).
- Published
- 2020
9. A New Framework of Authentication Over Cloud Computing
- Author
-
Leila, Megouache, Zitouni, Abdelhafid, and Djoudi, Mahieddine
- Subjects
Computer Science - Cryptography and Security - Abstract
The growth of local data annually implies extra charges for the customers, which makes their business slowing down. Cloud computing paradigm comes with new technologies that offer a very economic and cost-effective solution, but the organizations are slow in accepting it due to security issues and challenges associated with it. Security is one of the major issues which hamper the growth of cloud and it is highly crucial to protect the sensitive data and systems in thecloud setting inorder toensure theprivacy ofits users. This work explores the new directions in cloud computing security, while highlighting the correct selection of these fundamental technologies from cryptographic point of view., Comment: 9 pages, 3 figures, Conference: Proceedings of the Computational Methods in Systems and Software (COMESYSO 2017)
- Published
- 2019
- Full Text
- View/download PDF
10. KAB: A new k-anonymity approach based on black hole algorithm
- Author
-
Kacha, Lynda, Zitouni, Abdelhafid, and Djoudi, Mahieddine
- Published
- 2022
- Full Text
- View/download PDF
11. Sentiment Analysis of Arabic Documents
- Author
-
Rahab, Hichem, primary, Djoudi, Mahieddine, additional, and Zitouni, Abdelhafid, additional
- Published
- 2022
- Full Text
- View/download PDF
12. Machine Learning for Cloud Data Classification and Anomaly Intrusion Detection.
- Author
-
Megouache, Leila, Zitouni, Abdelhafid, Sadouni, Salheddine, and Djoudi, Mahieddine
- Subjects
INFORMATION technology security ,MACHINE learning ,ARTIFICIAL intelligence ,K-means clustering ,ANOMALY detection (Computer security) ,INTRUSION detection systems (Computer security) - Abstract
The sheer volume of applications, data and users working in the cloud creates an ecosystem far too large to protect against possible attacks. Several attack detection mechanisms have been proposed to minimize the risk of data loss backed up to the cloud. However, these techniques are not reliable enough to protect them; this is due to the reasons of scalability, distribution and resource limitations. As a result, Information Technology Security experts may feel powerless against the growing threats plaguing the cloud. For that, we provide a reliable way to detect attackers who want to break into cloud data. In our framework, we have no labels and no predefined classes on historical data, and we wish to identify similar models to form homogeneous groups from our observations. Then, we will use a k-means clustering algorithm to handle unlabelled data, and a combination approach of clustering and classification. We start with a k-means clustering algorithm for generating a labelled dataset from an unlabelled dataset. By harnessing the power of a labelled dataset, we can train the extreme learning machine classifier to become an exceptional tool for intrusion detection. By utilizing this resampling technique, we can generate additional data sets to significantly enhance the system's capability to identify and thwart attacks. The innovation of this approach stems from its integration of clustering and classification into a unified learning model. The cutting-edge framework has been successfully implemented on the renowned KDD99 dataset, producing impressive numerical results that not only affirm its exceptional accuracy but also highlight the significant time-saving advantages of this innovative approach. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
13. Overview of Web Content Mining Tools
- Author
-
Herrouz, Abdelhakim, Khentout, Chabane, and Djoudi, Mahieddine
- Subjects
Computer Science - Information Retrieval - Abstract
Nowadays, the Web has become one of the most widespread platforms for information change and retrieval. As it becomes easier to publish documents, as the number of users, and thus publishers, increases and as the number of documents grows, searching for information is turning into a cumbersome and time-consuming operation. Due to heterogeneity and unstructured nature of the data available on the WWW, Web mining uses various data mining techniques to discover useful knowledge from Web hyperlinks, page content and usage log. The main uses of web content mining are to gather, categorize, organize and provide the best possible information available on the Web to the user requesting the information. The mining tools are imperative to scanning the many HTML documents, images, and text. Then, the result is used by the search engines. In this paper, we first introduce the concepts related to web mining; we then present an overview of different Web Content Mining tools. We conclude by presenting a comparative table of these tools based on some pertinent criteria., Comment: 06 pages
- Published
- 2013
14. Navigation Assistance and Web Accessibility Helper
- Author
-
Herrouz, Abdelhakim, Khentout, Chabane, and Djoudi, Mahieddine
- Subjects
Computer Science - Human-Computer Interaction - Abstract
Web accessibility is actually the most important aspect for providing access to information and interaction for people with disabilities. However, it seems that the ability of users with disabilities to navigate over the Web is not dependent on the graphical complexity, but on the markup used to create the structure of the website. Consequently, it is necessary to design some software assistants to help all users to mark themselves in space during a navigation session. In this paper, we propose an assistant for browsing on the Internet to allow user to get one s bearings within Web navigation. We describe our approach which puts at the disposal of the user a visited site map, thus giving an explicit representation of virtual space. Different levels of visualization are implemented in order to make the map more visible and less overloaded., Comment: 07 pages. arXiv admin note: substantial text overlap with arXiv:1304.2610
- Published
- 2013
15. Overview of Visualization Tools for Web Browser History Data
- Author
-
Herrouz, Abdelhakim, Khentout, Chabane, and Djoudi, Mahieddine
- Subjects
Computer Science - Human-Computer Interaction - Abstract
Nowadays, the Web has become one of the most widespread platforms for information change and retrieval. As it becomes easier to publish documents, as the number of users, and thus publishers, increases and as the number of documents grows, searching for information is turning into a cumbersome and time-consuming operation. Because of the loose interconnection between documents, people have difficulty remembering where they have been and returning to previously visited pages. Navigation through the web faces problems of locating oneself with respect to space and time. The idea of graphical assistance navigation is to help users to find their paths in hyperspace by adapting the style of link presentation to the goals, knowledge and other characteristics of an individual user. We first introduce the concepts related to web navigation; we then present an overview of different graphical navigation tools and techniques. We conclude by presenting a comparative table of these tools based on some pertinent criteria.
- Published
- 2013
16. Conception and Use of Ontologies for Indexing and Searching by Semantic Contents of Video Courses
- Author
-
Merzougui, Ghalia, Djoudi, Mahieddine, and Behaz, Amel
- Subjects
Computer Science - Digital Libraries ,Computer Science - Information Retrieval - Abstract
Nowadays, the video documents like educational courses available on the web increases significantly. However, the information retrieval systems today can not return to the users (students or teachers) of parts of those videos that meet their exact needs expressed by a query consisting of semantic information. In this paper, we present a model of pedagogical knowledge of current videos. This knowledge is used throughout the process of indexing and semantic search segments instructional videos. Our experimental results show that the proposed approach is promising., Comment: 9 pages, 5 figures, 1 table and 2 codes
- Published
- 2012
17. Sentiment Analysis of Arabic Documents
- Author
-
Rahab, Hichem, primary, Djoudi, Mahieddine, additional, and Zitouni, Abdelhafid, additional
- Published
- 2021
- Full Text
- View/download PDF
18. SIAAC: Sentiment Polarity Identification on Arabic Algerian Newspaper Comments
- Author
-
Rahab, Hichem, Zitouni, Abdelhafid, Djoudi, Mahieddine, Kacprzyk, Janusz, Series editor, Pal, Nikhil R., Advisory editor, Bello Perez, Rafael, Advisory editor, Corchado, Emilio S., Advisory editor, Hagras, Hani, Advisory editor, Kóczy, László T., Advisory editor, Kreinovich, Vladik, Advisory editor, Lin, Chin-Teng, Advisory editor, Lu, Jie, Advisory editor, Melin, Patricia, Advisory editor, Nedjah, Nadia, Advisory editor, Nguyen, Ngoc Thanh, Advisory editor, Wang, Jun, Advisory editor, Silhavy, Radek, editor, Silhavy, Petr, editor, and Prokopova, Zdenka, editor
- Published
- 2018
- Full Text
- View/download PDF
19. Algeria
- Author
-
Djoudi, Mahieddine, Weber, Alan S., editor, and Hamlaoui, Sihem, editor
- Published
- 2018
- Full Text
- View/download PDF
20. Content-Based Recommender System using Word Embeddings for Pedagogical Resources
- Author
-
Mediani, Chahrazed, primary, Harous, Saad, additional, and Djoudi, Mahieddine, additional
- Published
- 2023
- Full Text
- View/download PDF
21. A Security Method for Cloud Storage Using Data Classification
- Author
-
Arki, Oussama, primary, Zitouni, Abdelhafid, additional, and Djoudi, Mahieddine, additional
- Published
- 2023
- Full Text
- View/download PDF
22. 3DVL@ES
- Author
-
Amel Douar, Djoudi Mahieddine, Saad Harous, and Alti Adel
- Subjects
Computer Networks and Communications ,Computer Science Applications - Abstract
This paper introduces a virtual laboratory that aims to support the quick development and easy assimilation of practical works by learners and exchange documents between them via a shared virtual space. The proposed laboratory, named 3DVL@ES (web-based 3D virtual laboratory in experimental science), defines an agile design process to automatically generate 3D pedagogical web applications and provide very appreciable interactivity, flexibility, and collaboration for practical works development. Also, 3DVL@ES includes the specification of learners' interactions and collaborations on a unified application model to assist and automate the creation of new 3D interfaces related to practical work in experimental sciences. 3DVL@ES has been applied in a real case study of Daniel's Battery. The obtained results have been compared with other virtual laboratories to show the usefulness of 3DVL@ES. Experimental results show that 3DVL@ES laboratory easily achieves complex practical works with the integration of cooperation and collaboration aspects.
- Published
- 2023
- Full Text
- View/download PDF
23. Ensuring user authentication and data integrity in multi-cloud environment
- Author
-
Megouache, Leila, Zitouni, Abdelhafid, and Djoudi, Mahieddine
- Published
- 2020
- Full Text
- View/download PDF
24. An Autonomous Multi-Agent System for Customized Scientific Literature Recommendation: A Tool for Researchers and Students
- Author
-
Herrouz, Abdelhakim, primary, Djoudi, Mahieddine, additional, Degha, Houssem Eddine, additional, and Boukanoun, Bouchra, additional
- Published
- 2023
- Full Text
- View/download PDF
25. Towards a Recommendation System for the Learner from a Semantic Model of Knowledge in a Collaborative Environment
- Author
-
Mediani, Chahrazed, Abel, Marie-Hélène, Djoudi, Mahieddine, Rannenberg, Kai, Editor-in-chief, Sakarovitch, Jacques, Series editor, Goedicke, Michael, Series editor, Tatnall, Arthur, Series editor, Neuhold, Erich J., Series editor, Pras, Aiko, Series editor, Tröltzsch, Fredi, Series editor, Pries-Heje, Jan, Series editor, Whitehouse, Diane, Series editor, Reis, Ricardo, Series editor, Murayama, Yuko, Series editor, Dillon, Tharam, Series editor, Gulliksen, Jan, Series editor, Rauterberg, Matthias, Series editor, Amine, Abdelmalek, editor, Bellatreche, Ladjel, editor, Elberrichi, Zakaria, editor, and Wrembel, Robert, editor
- Published
- 2015
- Full Text
- View/download PDF
26. Communications in Computer and Information Science: The Impact of an Online Environment Reading Comprehension: A Case of Algerian EFL Students
- Author
-
Zidat, Samir, Djoudi, Mahieddine, Cherifi, Hocine, editor, Zain, Jasni Mohamad, editor, and El-Qawasmeh, Eyas, editor
- Published
- 2011
- Full Text
- View/download PDF
27. Measuring Similarity of Educational Items Using Data on Learners’ Performance and Behavioral Parameters: Application of New Models SCNN-Cosine and Fuzzy-Kappa
- Author
-
Harbouche, Khadidja, primary, Khentout, Chabane, additional, Djoudi, Mahieddine, additional, and Alti, Adel, additional
- Published
- 2023
- Full Text
- View/download PDF
28. SIAAC: Sentiment Polarity Identification on Arabic Algerian Newspaper Comments
- Author
-
Rahab, Hichem, primary, Zitouni, Abdelhafid, additional, and Djoudi, Mahieddine, additional
- Published
- 2017
- Full Text
- View/download PDF
29. AMACE: agent based multi-criterions adaptation in cloud environment
- Author
-
Kemchi, Sofiane, Zitouni, Abdelhafid, and Djoudi, Mahieddine
- Published
- 2018
- Full Text
- View/download PDF
30. Tele-Collaboration System in CVLab
- Author
-
Mechta, Djamila, primary, Harous, Saad, additional, and Djoudi, Mahieddine, additional
- Published
- 2022
- Full Text
- View/download PDF
31. Arabic Fake News and Spam Handling: Methods, Resources and Opportunities
- Author
-
Rahab, Hichem, primary, Zitouni, Abdelhafid, additional, and Djoudi, Mahieddine, additional
- Published
- 2021
- Full Text
- View/download PDF
32. SANA: Sentiment analysis on newspapers comments in Algeria
- Author
-
Rahab, Hichem, primary, Zitouni, Abdelhafid, additional, and Djoudi, Mahieddine, additional
- Published
- 2021
- Full Text
- View/download PDF
33. A Security Method for Cloud Storage Using Data Classification
- Author
-
Djoudi, Mahieddine, Arki, Oussama, and Zitouni, Abdelhafid
- Abstract
Cloud computing is an information technology model that provides computing and storage resources as a service. Data storage security remains the main challenge in adapting this new model. The common solution to secure data in the cloud is data encryption. However, handling all the data with the same security policy does not appear to be good practice, because they do not have the same sensibility for the data owner. The present research proposes a new method to improve the security of data in cloud storage. It combines two domains represented by machine learning and multi criteria decision making, in order to provide a new classification method, that classifies data before being introduced into a suitable encryption system according to their category. A Cloudsim simulation has been used to demonstrate the effectiveness of the proposed method. The results of the simulation exhibit that our method is more efficient and accurate and takes less processing time, while ensuring data confidentiality and integrity.
- Published
- 2023
- Full Text
- View/download PDF
34. Learner to Learner Fuzzy Profiles Similarity Using a Hybrid Interaction Analysis Grid
- Author
-
Khentout, Chabane, primary, Harbouche, Khadidja, additional, and Djoudi, Mahieddine, additional
- Published
- 2021
- Full Text
- View/download PDF
35. An authoring system for pedagogical content creation and management
- Author
-
Douidi, Lamri, Khentout, Chabane, Harous, Saad, and Djoudi, Mahieddine
- Subjects
Distance education ,Refrigeration equipment -- Usage ,Teachers ,Universities and colleges ,Internet ,Education ,Company business management ,Internet ,Management ,Usage - Abstract
Algerian Virtual University AVUNET (Algerian Virtual University on the NET) will be a multilingual environment for distance learning and teaching by exploiting communication and information technologies in particularly the Internet and the hypermedia [1]. The objective of our work is to develop within AVUNET, an authoring package (AVUNET Author) that makes it possible for instructors who are not information technology specialists to create interactive learning modules within a distance teaching platform. A pedagogic model based on a conceptual network is used as a support for the construction system. Based on this model, the system will guide the user in the tree structure, by indicating the necessary concepts for comprehension of other concepts at a higher level. The users of the authoring module are instructors, whatever their information technology experience is. The content designed is made accessible to the learner through a computer connected to the network. Tests in real situation are being done at the University Ferhat Abbas (Setif Algeria) in collaboration with a group of instructors and students. This experience has helped us to outline a methodology to create interactive modular courses (bag pedagogic) accessible on Internet and CD-ROM. Keywords.- Authoring System, Virtual University, Distance Education, and Learner Evaluation., 1. INTRODUCTION The content is defined as a set of structured teaching and learning experiments (content objectives, skills objectives, specific objectives, different paths and progression rules, teaching and training activities, [...]
- Published
- 2008
36. Agent-based design for e-learning environment
- Author
-
Harbouche, Khadidja and Djoudi, Mahieddine
- Subjects
Online education -- Research ,Online education -- Models ,Internet -- Research ,Internet -- Usage ,Internet ,Computers - Abstract
We presented an agent-based e-learning environment. Our aim was to allow many users to interact collectively and intelligently with the environment. In this cooperation model, human users and artificial agents carry out tasks in the learners' service. We define the internal structure of our kernel supposed to work within Internet/Intranet settings. Design was structured in three parts: individual learning space, collaborative space, and cooperative space. We advocate the employment of an agent-based approach, a suitable for two main reasons: agents were a natural metaphor of human acts, and the learning systems are generally complex. Prometheus methodology used for the design and emphasis placed on the agent-based features. Key words: Artificial agent, human agent, agent-based design, e-learning environment, cooperation, INTRODUCTION The incorporation of computer science and telecommunications has profoundly changed the implementation problems of learning systems. An e-learning environment is an individual and customizable implement allowing every user to [...]
- Published
- 2007
37. Users assistants for e-learning environment over the Web
- Author
-
Douidi, Lamri, Djoudi, Mahieddine, and Khentout, Chabane
- Subjects
Online education -- Research ,Online education -- Methods ,Computers - Abstract
In this study, we present users assistants for e-learning environment over the Web called AVUNET. It was made up of an educational server that allows access to the available courses on the site. The server was structured in pedagogical labs that respond to the user needs. It offers also a module for self-evaluation so that the user can evaluate his/her level. Trainers have created this facility very carefully to assure a detailed evaluation with very accurate solutions. Based on the model of 'telephone ring', the system proposes facilities for communication and collaboration in order to bring the trainers and the learners closer to each other. This forum of trainers and learners allow the users to exchange information and their experiences pedagogic. These experiences are acquired by the use of computer aided tools for virtual navigation through structured hypertext documents. The user actions during a learning or navigation session are analyzed. Key words: Authoring system, e-learning, content design, learner assistance, INTRODUCTION Among the potential of the advent of communication and information technologies, in the field of the e-learning, is the development of environments that support distance co-operative training. Within this [...]
- Published
- 2007
38. Roundup of graphical navigation helpers on the web
- Author
-
Khentout, Chabane, Djoudi, Mahieddine, and Douidi, Lamri
- Subjects
Web browsers -- Usage ,World Wide Web -- Management ,Web browser ,World Wide Web ,Company business management ,Computers - Abstract
Despite the recent research, the Web remains mainly constituted of an ever-growing network of documents. As it becomes easier to publish documents, as the number of users and thus publishers, increases and as the number of documents grows, searching for information is turning into a cumbersome and time-consuming operation. Because of the loose interconnection between documents, people have difficulty remembering where they have been and returning to previously visited pages. Navigation through the web faces problems of locating oneself with respect to space and time. The idea of graphical assistance navigation is to help users to find their paths in hyperspace by adapting the style of link presentation to the goals, knowledge and other characteristics of an individual user. We first introduced the concepts related to web navigation; then present an overview of different graphical navigation tools and techniques. We concluded by presenting a comparative table of these tools based on some pertinent criteria. Key words: Navigation helpers, cognitive overhead, disorientation, navigation map, INTRODUCTION The web is an open space of information, dynamic, distributed, heterogeneous and non-moderated. One notes that on the Web, sites appear and disappear, content is modified and it becomes [...]
- Published
- 2007
39. Task collaborative resolution tool for elearning environment
- Author
-
Zidat, Samir and Djoudi, Mahieddine
- Subjects
Group work in education -- Technology application ,Team learning approach in education -- Technology application ,Information technology -- Usage ,Online education -- Research ,Information technology ,Technology application ,Computers - Abstract
Abstract: In this article, we are interested in the tasks collaborative resolution in elearning context, and in the use of information technology to support this activity. A part of this [...]
- Published
- 2006
40. Learning and navigation assistance in a hypermedia
- Author
-
Khentout, Chabane, Harous, Saad, Douidi, Lamri, and Djoudi, Mahieddine
- Subjects
Hypertext -- Usage -- Study and teaching ,Education ,Usage ,Study and teaching - Abstract
Navigating through hypermedia the user faces problems of locating oneself with respect to space and time. That is why there is a need to develop tools that can help the user locate himself to see where he has been browsing through the net during a particular navigation session through hypermedia. It is needed to offer the user a map of the visited sites, allowing him to have an explicit representation of virtual space. We first introduce the concepts related to hypermedia navigation; we then present an overview of different computer aided navigation tools and techniques. We conclude by presenting a comparative table of these tools based on some pertinent criteria. Keywords: Navigation, learning, hypermedia, hypertext, and navigation map., INTRODUCTION One notes that in hypermedia, sites appear and disappear, content is modified and it becomes impossible to master its organization. On the other hand, the web made it possible, [...]
- Published
- 2006
41. Supporting tools to simplify the navigation process over the Web
- Author
-
Khentout, Chabane, Djoudi, Mahieddine, and Douidi, Lamri
- Subjects
Internet access -- Analysis ,Aids to air navigation -- Usage ,Aids to navigation -- Usage ,Time measurement -- Analysis ,Timekeeping -- Analysis ,Internet access ,Computers - Abstract
Abstract: We Navigation through the Web has problems of positioning and space-temporal reference marks. Therefore, it's necessary to design some computer-aided tools to help the user to position himself in [...]
- Published
- 2006
42. AVUNET Author: an authoring system for distance learning platform
- Author
-
Douidi, Lamri, Djoudi, Mahieddine, and Khentout, Chabane
- Subjects
Distance education -- Technology application ,Educational software -- Research ,Educational software -- Design and construction ,Educational/training software ,Technology application ,Computers - Abstract
Abstract: An authoring system was presented in this study, 'AVUNET Author' which allows the creation of interactive learning object within a distance teaching platform on the Internet. For the conception [...]
- Published
- 2006
43. Text Entry System for Semitic Languages on Mobile Devices
- Author
-
Djoudi, Mahieddine, primary and Harous, Saad, additional
- Published
- 2009
- Full Text
- View/download PDF
44. An Enhanced Corpus for Arabic Newspapers Comments
- Author
-
Rahab, Hichem, primary, Zitouni, Abdelhafid, additional, and Djoudi, Mahieddine, additional
- Published
- 2020
- Full Text
- View/download PDF
45. Simplifying the learning process over the Internet
- Author
-
Djoudi, Mahieddine and Harous, Saad
- Subjects
World Wide Web ,World Wide Web -- Education ,Education -- Science and technology policy - Abstract
Information and communication technologies, on which new training and learning media are based, have improved the transmission and access of data. But they have not facilitated enough interaction between the […]
- Published
- 2001
46. La curation des ressources en Learning Analytics
- Author
-
Djoudi, Mahieddine, Technologies Numériques pour l'éducation (TECHNÉ - EA 6316), and Université de Poitiers
- Subjects
[INFO.INFO-IR]Computer Science [cs]/Information Retrieval [cs.IR] ,[INFO.INFO-WB]Computer Science [cs]/Web ,veille bibliographique ,[INFO.EIAH]Computer Science [cs]/Technology for Human Learning ,Learning analytics ,Curation de ressources ,[INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI] - Abstract
Keynote; International audience; En 2014, le ministère français de l’éducation a prévu que la direction du numérique pour l'éducation (DNE) assure une fonction de veille, de prospective et de communication dans le domaine du numérique éducatif et de l'innovation. A ce titre, la DNE pilote la mission d'incubation des projets numériques (Numeri'Lab) et assure un travail de soutien, de mise en synergie et d'accompagnement des incubateurs académiques.Cette démarche a pour objectif d'identifier les freins et les leviers apparus lors de la mise en œuvre des projets, de décrire les démarches innovantes adoptées et les travaux de recherche et d'évaluation éventuellement mis en œuvre avec l'université. Les résultats observés contribuent à l'évolution de la formation à destination des communautés éducatives et pédagogiques. La DNE avait identifié 8 thèmes d’étude structurés en autant de groupes de travail, dont le groupe de travail 2, intitulé « learning analytics) ».Les Learning analytics sont communément définis comme étant « la mesure, la collection, l’analyse et l’interprétation des traces des apprenants et de leurs contextes, pour comprendre et optimiser l’apprentissage et les environnements dans lesquels il se produit.La curation des ressources correspond à une pratique qui consiste à sélectionner, éditer et partager les contenus les plus pertinents du Web pour une requête ou un sujet donné.Pour effectuer le travail de curation et de veille, nous avons, dans un premier temps effectué une étude de l’état de l’art des outils numériques. Nous avons ensuite sélectionné les outils qui nous ont semblé les meilleurs et surtout complémentaires. Ces outils sont :•Le moteur de recherche Google et son système d’alerte•Le moteur de recherche scientifique Google Scholar•Le réseau social Facebook•La plate-forme de curation Scoop-it•Le service de curation Paper.li •Le réseau social et système de partage Pinterest•Le site de curation de contenu Bag the WebAvec tous ces outils, nous avons créé des comptes et effectués les paramétrages nécessaires afin de pouvoir bénéficier des fonctionnalités de ces outils. Par ailleurs, la gestion collaborative des références bibliographiques est assurée en utilisant l’outil et la plate-forme Zotero.
- Published
- 2018
47. A New Framework of Authentication Over Cloud Computing
- Author
-
Megouache Leila, Zitouni Abdelhafid, Djoudi Mahieddine, Laboratoire d'Informatique Répartie [Algérie] (LIRE), Université de Constantine 2 Abdelhamid Mehri [Constantine], Technologies Numériques pour l'éducation (TECHNÉ - EA 6316), and Université de Poitiers
- Subjects
Authentication ,Cloud computing security ,Point (typography) ,Computer science ,business.industry ,Emerging technologies ,020206 networking & telecommunications ,020207 software engineering ,Cryptography ,Cloud computing ,02 engineering and technology ,Computer security ,computer.software_genre ,[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] ,Work (electrical) ,Order (exchange) ,0202 electrical engineering, electronic engineering, information engineering ,Security ,[INFO.EIAH]Computer Science [cs]/Technology for Human Learning ,business ,computer - Abstract
International audience; The growth of local data annually implies extra charges for the customers, which makes their business slowing down. Cloud computing paradigm comes with new technologies that offer a very economic and cost-effective solution, but the organizations are slow in accepting it due to security issues and challenges associated with it. Security is one of the major issues which hamper the growth of cloud and it is highly crucial to protect the sensitive data and systems in the cloud setting in order to ensure the privacy of its users. This work explores the new directions in cloud computing security, while highlighting the correct selection of these fundamental technologies from cryptographic point of view.
- Published
- 2018
- Full Text
- View/download PDF
48. Learning Analytics : terminologie du Learning Analytics
- Author
-
Djoudi, Mahieddine, Luengo, Vanda, Kechaï, Hassina, François Cerisier, Jean, Maugard, Emmanuel, Cherigny, Florence, Champalle, Olivier, Iksal, Sébastien, Beust, Pierre, Technologies Numériques pour l'éducation (TECHNÉ - EA 6316), Université de Poitiers, Modèles et Outils en ingénierie des Connaissances pour l'Apprentissage Humain (MOCAH), LIP6, Sorbonne Université (SU)-Centre National de la Recherche Scientifique (CNRS)-Sorbonne Université (SU)-Centre National de la Recherche Scientifique (CNRS), Université de Poitiers - UFR Sciences Humaines et Arts (Poitiers UFR SHA), Centre d'études sur la cooperation juridique internationale (CECOJI), Université de Poitiers-Centre National de la Recherche Scientifique (CNRS), Supporting Interaction and Learning by Experience (SILEX), Laboratoire d'InfoRmatique en Image et Systèmes d'information (LIRIS), Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Centre National de la Recherche Scientifique (CNRS)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-École Centrale de Lyon (ECL), Université de Lyon-Université Lumière - Lyon 2 (UL2)-Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Université Lumière - Lyon 2 (UL2), Laboratoire d'Informatique de l'Université du Mans (LIUM), Le Mans Université (UM), Equipe Hultech - Laboratoire GREYC - UMR6072, Groupe de Recherche en Informatique, Image et Instrumentation de Caen (GREYC), Centre National de la Recherche Scientifique (CNRS)-École Nationale Supérieure d'Ingénieurs de Caen (ENSICAEN), Normandie Université (NU)-Normandie Université (NU)-Université de Caen Normandie (UNICAEN), Normandie Université (NU)-Centre National de la Recherche Scientifique (CNRS)-École Nationale Supérieure d'Ingénieurs de Caen (ENSICAEN), Normandie Université (NU), Direction du Numérique pour l’Éducation, ministère de l’Enseignement supérieur de la Recherche et de l’Innovation (France), and DNE-LA-GTNum2
- Subjects
adaptive Learning ,educational data mining ,deep learning ,[INFO.EIAH]Computer Science [cs]/Technology for Human Learning ,Learning analytics ,learning machine ,[INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI] - Abstract
L’objectif principal est de préciser les définitions dans le domaine de l’éducation des termes suivants (souvent anglais) : Learning analytics, educational data mining, deep learning , learning machine, adaptive Learning, etc.
- Published
- 2018
49. Learning Analytics : Notes de veille, partage et curation de ressources
- Author
-
Djoudi, Mahieddine, Luengo, Vanda, Kechaï, Hassina, François Cerisier, Jean, Maugard, Emmanuel, Cherigny, Florence, Champalle, Olivier, Iksal, Sébastien, Beust, Pierre, Technologies Numériques pour l'éducation (TECHNÉ - EA 6316), Université de Poitiers, Modèles et Outils en ingénierie des Connaissances pour l'Apprentissage Humain (MOCAH), LIP6, Sorbonne Université (SU)-Centre National de la Recherche Scientifique (CNRS)-Sorbonne Université (SU)-Centre National de la Recherche Scientifique (CNRS), Université de Poitiers - UFR Sciences Humaines et Arts (Poitiers UFR SHA), Centre d'études sur la cooperation juridique internationale (CECOJI), Université de Poitiers-Centre National de la Recherche Scientifique (CNRS), Supporting Interaction and Learning by Experience (SILEX), Laboratoire d'InfoRmatique en Image et Systèmes d'information (LIRIS), Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Centre National de la Recherche Scientifique (CNRS)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-École Centrale de Lyon (ECL), Université de Lyon-Université Lumière - Lyon 2 (UL2)-Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Université Lumière - Lyon 2 (UL2), Laboratoire d'Informatique de l'Université du Mans (LIUM), Le Mans Université (UM), Equipe Hultech - Laboratoire GREYC - UMR6072, Groupe de Recherche en Informatique, Image et Instrumentation de Caen (GREYC), Centre National de la Recherche Scientifique (CNRS)-École Nationale Supérieure d'Ingénieurs de Caen (ENSICAEN), Normandie Université (NU)-Normandie Université (NU)-Université de Caen Normandie (UNICAEN), Normandie Université (NU)-Centre National de la Recherche Scientifique (CNRS)-École Nationale Supérieure d'Ingénieurs de Caen (ENSICAEN), Normandie Université (NU), and Direction du Numérique pour l’Éducation, ministère de l’Enseignement supérieur de la Recherche et de l’Innovation (France)
- Subjects
ressources ,[INFO.INFO-IR]Computer Science [cs]/Information Retrieval [cs.IR] ,curation de contenu ,édition ,[INFO.EIAH]Computer Science [cs]/Technology for Human Learning ,partage ,Learning Analytics ,[INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI] - Abstract
La curation de contenu correspond à une pratique qui consiste à sélectionner, éditer et partager les contenus les plus pertinents du Web pour une requête ou un sujet donné. Le rapport concerne la curation du contenu sur le domaine du Learning Analytics
- Published
- 2018
50. ARAACOM
- Author
-
Rahab, Hichem, Zitouni, Abdelhafid, Djoudi, Mahieddine, Ingénierie des connaissances et sécurité informatique (ICOSI), Laboratoire Interdisciplinaire de recherches en éducation (LIRE), Université de la Nouvelle Calédonie (UNC), Laboratoire d'Informatique Répartie [Algérie] (LIRE), Université de Constantine 2 Abdelhamid Mehri [Constantine], Technologies Numériques pour l'éducation (TECHNÉ - EA 6316), Université de Poitiers, and Université de la Nouvelle-Calédonie (UNC)
- Subjects
SVM ,Performance ,Experimentation Keywords Opinion Mining ,NLP ,[INFO.INFO-CL]Computer Science [cs]/Computation and Language [cs.CL] ,[INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI] ,[INFO.INFO-TT]Computer Science [cs]/Document and Text Processing ,machine learning ,Arabic comments ,Sentiment Analysis ,NB ,Opinion Mining ,newspaper ,General Terms Measurement ,Natural Language Processing - Abstract
International audience; Nowadays, it is no more needed to do an enormous effort to distribute a lot of forms to thousands of people and collect them, then convert this from into electronic format to track people opinion about some subjects. A lot of web sites can today reach a large spectrum with less effort. The majority of web sites suggest to their visitors to leave backups about their feeling of the site or events. So, this makes for us a lot of data which need powerful mean to exploit. Opinion mining in the web becomes more and more an attracting task, due the increasing need for individuals and societies to track the mood of people against several subjects of daily life (sports, politics, television,...). A lot of works in opinion mining was developed in western languages especially English, such works in Arabic language still very scarce. In this paper, we propose our approach, for opinion mining in Arabic Algerian news paper. CCS CONCEPTS •Information systems~Sentiment analysis • Computing methodologies~Natural language processing
- Published
- 2017
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.